Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

uerades as a useful program malicious sofrware that masquerades as a a Spyware .

ID: 139851 • Letter: U

Question

uerades as a useful program malicious sofrware that masquerades as a a Spyware . A Trojan horse c.A virus d. A worm As th 7. Aonnects compurers located in a geographicly clog a. LAN b WAN c. WAP d. VPN Microsofe Windows, DOS, and Mac OS X are examples of a application sofrware. b. operating systems. c sprcadsheets. impo 8. ear is cors b. d. database sofrware. 9. Storing and accessing daca and programs over the Internet is known a a phishing b. digital certificates. c. cloud computing d. infrastructure 3. 10. The CHTS cegaification exams do not measure an individual's co regard to a. installing and testing systems. b. diagnosing IT problems. c. selecting hardware and software. mpecn g s s 6. 7. d. programming software. 8. 152 Chap

Explanation / Answer

6. b Trojen horse is malicious software that masquerades as a useful programme.

7. a. LAN connect computers located in a geographically close area.

8.Microsoft windows,DOS and MAX OS X are examples of b. Operating systems.

9.Storing and accessing data and programmes over the internet is known as c.Cloud computing.

10. The CHTS certification exams do not measure an individual competency level regard to

       d. Programming software.